[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/851038.856657guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Robust Protocols for Proving Ownership of Images

Published: 27 March 2000 Publication History

Abstract

We explore the problem of proving ownership or origin of multimedia content like image/video or audio signals through watermarking. The need for watermarking arises out of the unsuitability of present copyright laws for claiming ownership of digital content. Watermarking schemes however, are threatened by counterfeit attacks, which primarily use the freedom available in the choice of signature or choice of the watermarking method. A restrictive protocol for watermarking could go a long way in rendering counterfeit attacks extremely difficult. We suggest a comprehensive protocol that makes it possible for the true owner to claim ownership unambiguously, while making it extremely difficult for a pirate to do so.

References

[1]
I.J. Cox, J. Kilian, F.T. Leighton, T.G. Shamoon, "Secure Spread Spectrum Watermarking for Multimedia", IEEE Transactions on Image Processing, vol 6 (12) pp 1673-1687, 1997.
[2]
W. Zeng, B. Liu, "On Resolving Rightful Ownerships of Digital Images by Invisible Watermarks", IEEE International Conference on Image Processing, vol 1 pp 552-555, Santa Barbara, CA, October 1997.
[3]
M. Ramkumar, A.N. Akansu, "A Robust Scheme for Oblivious Detection of Watermarks/ Data Hiding in Still Images", SPIE Multimedia Systems and Applications, Boston, MA, vol 3528, pp 474-481, November 1998.
[4]
S. Craver, N. Memon, B-L. Yeo, M.M. Yeung, "Can Invisible Watermarks Resolve Rightful Ownerships", IS & T/SPIE Electronic Imaging: Human Vision and Electronic Imaging, vol 3022, pp 310-321, February 1997. Beach, CA, USA, pp 273-278, December 1998.
[5]
M. Ramkumar, A.N. Akansu, "Image Watermarks and Counterfeit Attacks : Some Problems and Solutions", Content Security and Data Hiding in Digital Media, Newark, NJ, May 1999.
[6]
R.B. Wolfgang, E.J. Delp, "Overview of Image Security Techniques with Applications in Multimedia Systems," Proceedings of the SPIE Conference on Multimedia Networks, Dallas, TX, vol 3228, pp 297-308, November 1997.
[7]
A. Papoulis, Probability, Random Variables, and Stochastic Processes, Third Edition, McGraw Hill Inc., 1991.
[8]
M. Kutter, F.A.P. Petitcolas. "A Fair Benchmark for Image Watermarking Systems", Electronic Imaging, vol 3657, pp. 226-239, San Jose, CA, USA, January 1999.
[9]
P.M.J. Rongen, M.J.J.J.B. Maes, C.W.A.M. van Overveld, "Digital Image Watermarking by Salient Point Modification: Practical Results," Proceedings of SPIE, San Jose, CA, vol 3657, pp 273-282, January 1999.
[10]
M. Ramkumar, A.N. Akansu, "On the Design of Robust Data Hiding Systems", presented in the 33rd ASILOMAR Conference on Signals, Systems and Computers, Pacific Grove, CA, October 1999.
[11]
M. Wu, B. Liu, "Watermarking for Image Authentication", IEEE International Conference on Image Processing, Chicago, IL, USA, vol 2, pp 437-441, October 1998.
[12]
H.H. Yu, A. Gelman, "Information Hiding System for Digital Video Playback and Record Control", SPIE's International Symposium on Voice, Video and Data Communications, Boston, MA, vol 3845, September 1999.
[13]
M. Ramkumar, A.N. Akansu, "Signaling for Multimedia Steganography", submitted to the IEEE Transactions on Signal Processing, November 1999.

Index Terms

  1. Robust Protocols for Proving Ownership of Images

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    ITCC '00: Proceedings of the The International Conference on Information Technology: Coding and Computing (ITCC'00)
    March 2000
    ISBN:0769505406

    Publisher

    IEEE Computer Society

    United States

    Publication History

    Published: 27 March 2000

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 0
      Total Downloads
    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 10 Dec 2024

    Other Metrics

    Citations

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media